Affiliation:
1. Government College of Engineering
2. Annamalai University
Abstract
One of the most common types of network attacks involves non-forwardable bandwidth nodes that pretend to be intermediate nodes on the route to certain destinations and drop every packet that subsequently passes through it. This paper proposes attacks through black holes as an analysis method for detecting malicious nodes in Mobile Ad-hoc Networks (MANET). Because the mechanism and protocol are collaborative, it can confidently analyse and identify malicious hosts. To test the effectiveness of this approach, it uses a hybrid Hierarchical Link State routing protocol based on Modified-ZoneBased Hierarchical Link State Routing Protocol (M-ZHLS) in Network Simulations 2 (NS2) with mobile nodes. As the mobility rate changes and the topology size changes, it can be seen that the detection rate of black holes and malicious nodes is extremely high, the average delay is reduced, and the packet delivery rate is increased compared to the Zone-Based Hierarchical Link State Routing Protocol (ZHLS).
Reference14 articles.
1. Ad hoc On-Demand Distance Vector Routing. (n.d).
In Wikipedia. Retrieved from https://en.wikipedia.org/wiki/Ad_hoc_On-Demand_Distance_Vector_Routing#
2. Bhalaji, N., Banerjee, S., & Shanmugam, A. (2008). A
novel routing technique against packet dropping attack
in adhoc networks. Journal of Computer Science, 4, 538-544.
3. Deswal, S., & Singh, S. (2010). Implementation of
routing security aspects in AODV. International Journal of
Computer Theory and Engineering, 2(1), 135-138.
4. An Efficient ZHLS Routing Protocol for Mobile Ad Hoc Networks
5. Energy efficient routing protocol with ad hoc on-demand distance vector for MANET